Featured Articles

LG G Watch R ships in two weeks

LG G Watch R ships in two weeks

The LG G Watch R, the first Android Wear watch with a truly round face, is coming soon and judging by…

More...
LG unveils NUCLUN big.LITTLE SoC

LG unveils NUCLUN big.LITTLE SoC

LG has officially announced its first smartphone SoC, the NUCLUN, formerly known as the Odin.

More...
Microsoft moves 2.4 million Xbox Ones

Microsoft moves 2.4 million Xbox Ones

Microsoft has announced that it move 2.4 million consoles in fiscal year 2015 Q1. The announcement came with the latest financial…

More...
Gainward GTX 970 Phantom previewed

Gainward GTX 970 Phantom previewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
EVGA GTX 970 SC ACX 2.0 reviewed

EVGA GTX 970 SC ACX 2.0 reviewed

Nvidia has released two new graphics cards based on its latest Maxwell GPU architecture. The Geforce GTX 970 and Geforce GTX…

More...
Frontpage Slideshow | Copyright © 2006-2010 orks, a business unit of Nuevvo Webware Ltd.
Monday, 16 August 2010 11:39

Apple patches critical QuickTime Player vulnerability

Written by Jon Worrel

apple

Only affects Windows users, not Mac OS X

Over the weekend, Apple patched a crucial security vulnerability in QuickTime Player that exploses Windows users to malicious remote code execution attacks from hackers around the Internet.

According to the update description the patch fixes a stack buffer overflow which existed in the application's error logging system where viewing a maliciously crafted QuickTime movie could have potentially led to an "unexpeted" application termination or arbitrary code execution. In other words, if you've recently watched a video using QuickTime Player coming from any "questionable" source, you're at risk of being affected.

The update comes in the form of QuickTime 7.6.7 and is immediately available for Windows 7 users, Windows Vista users and Windows XP SP3 users. The update can be downloaded here.

Jon Worrel

E-mail: This e-mail address is being protected from spambots. You need JavaScript enabled to view it
blog comments powered by Disqus

 

Facebook activity

Latest Commented Articles

Recent Comments